Cloud Computing Data Storage Security: A Comprehensive Review

Authors

  • L. K. Suresh Kumar

Keywords:

Introduction, Cloud Computing And Cloud Storage, Cloud Storage Security, issues, solution, conclusion. Cloud service provider (CSP), cloud data storage, security issues, policies & protocols;

Abstract

Cloud computing is a transformative paradigm that alters the design and purchase of corporate hardware and software. The convenience of cloud computing is prompting the migration of data and application software to cloud data centers. The Cloud service provider (CSP) must guarantee integrity, availability, privacy, and confidentiality; yet, the CSP is failing to provide dependable data services to customers and to safeguard stored customer data. This paper delineates the challenges associated with cloud data storage, including data breaches, data theft, and the unavailability of cloud data. This document provides an overview of security concerns related to data storage and potential solutions. Numerous firms are unprepared to use cloud computing technology owing to inadequate security control policies and vulnerabilities in protection, resulting in various challenges in cloud computing. An autonomous procedure is necessary to ensure that data is accurately housed on the cloud storage server. This study will examine several strategies used for safe data storage in the cloud. This article presents a method to prevent collusion attacks resulting from illegal server modifications.

Downloads

Download data is not yet available.

References

Srikanta Patnaik, A Study on Data Storage Security Issues in Cloud Computing, 2nd International Conference on Intelligent Computing, Communication & Convergence (ICCC-2016), Procedia Computer Science 92 ( 2016 ) 128 – 135.

Shweta Sukhram Prasad1, Aarti Kanahiyalal Yadava2, Research on Cloud Data Storage Security, International Journal for Research in Applied Science & Engineering Technology (IJRASET), ISSN: 2321-9653; IC Value: 45.98; Volume 10 Issue VI June 2022- Available at www.ijraset.com.

Dajun Chang, Li Li, Ying Chang, Zhangquan Qiao, Cloud Computing Storage Backup and Recovery Strategy Based on Secure IoT and Spark, 23 November 2021, https://doi.org/10.1155/2021/9505249

Fenglian Cao, Lihong Zhang, Darshana A. Naik, José Luis Arias Gonzáles, Neha Verma, Amit Jain, Rituraj Jain, Ashutosh Sharma, Application of Cloud Computing Technology in Computer Secure Storage, https://doi.org/10.1155/2022/4767725

A. Abbas, K. Bilal, L. Zhang, S.U. Khan, A cloud based health insurance plan recommendation system: a user centered approach, Future Gener. Comput. Syst. (2014)

P. Mell, T. Grance, The NIST definition of cloud computing (draft), NIST Special Publ. 800 (145) (2011) 7.

J. Che, Y. Duan, T. Zhang, J. Fan, Study on the security models and strategies of cloud computing, Proc. Eng. 23 (2011) 586–593.

R. Chandramouli, M. Iorga, S. Chokhani, Cryptographic key management issues and challenges in cloud services, in: Secure Cloud Computing, Springer, New York, 2014, pp. 1–30.

C. Wang, Q. Wang, K. Ren, N. Cao, W. Lou, Toward secure and dependable storage services in cloud computing, IEEE Trans. Services Comput. 5 (2)(2012) 220–232.

M. Balduzzi, J. Zaddach, D. Balzarotti, E. Kirda, S. Loureiro, A security analysis of amazon’s elastic compute cloud service, in: Proceedings of the 27th Annual ACM Symposium on Applied Computing, 2012, pp. 1427–1434.

Duncan, Adrian, Sadie Creese, and Michael Goldsmith. "Insider attacks in cloud computing." Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on. IEEE, 2012.

[8] Khorshed, Md Tanzim, ABM Shawkat Ali, and Saleh A. Wasimi. "A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing." Future Generation computer systems 28.6 (2012): 833-851.

[9] A. Andrieux, K. Czajkowski, A. Dan, K. Keahey, H. Ludwig, T. Nakata, J. Pruyne, J. Rofrano, S. Tuecke, M. Xu, Web services agreement specification.

S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang, A. Ghalsasi, Cloud computing the business perspective, Decis. Support Syst. 51 (1) (2011) 176–189.

B. Hay, K. Nance, M. Bishop, Storm clouds rising: security challenges for IaaS cloud computing, in: 44th Hawaii International Conference on System Sciences (HICSS), IEEE, 2011, pp. 1–7.

L. Wei, H. Zhu, Z. Cao, X. Dong, W. Jia, Y. Chen, A.V. Vasilakos, Security and privacy for storage and computation in cloud computing, Inform. Sci. 258 (2014) 371–386.

O.D. Alowolodu, B.K. Alese, A.O. Adetunmbi, O.S. Adewale, O.S. Ogundele, Elliptic curve cryptography for securing cloud computing applications, Int. J.Comput. Appl. 66 (2013).

M. Aslam, C. Gehrmann, M. Bjorkman, Security and trust preserving VM migrations in public clouds, in: IEEE 11th International Conference on Trust,Security and Privacy in Computing and Communications (TrustCom), 2012, pp. 869–876.

Y. Tang, P.P. Lee, J.C.S. Lui, R. Perlman, Secure overlay cloud storage with access control and assured deletion, IEEE Trans. Dependable Secure Comput.9 (6) (2012) 903–916.

Q. Liu, G. Wang, J. Wu, Time-based proxy re-encryption scheme for secure data sharing in a cloud environment, Inform. Sci. 258 (2014) 355–370.

Z. Tari, Security and privacy in cloud computing, IEEE Cloud Comput. 1 (1) (2014) 54–57.

Cloud security alliance, security guidelines for critical areas of focus in cloud computing v3.0, 2011.

Y. Fu, Z. Lin, Exterior: using a dual-vm based external shell for guest-os introspection, configuration, and recovery, in: Proceedings of the 9th ACMSIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2013, pp. 97–110.

S.M.S. Chow, Y. He, L.C.K. Hui, S.M. Yiu, Spicesimple privacy-preserving identity-management for cloud environment, in: Applied Cryptography and Network Security, Springer, Berlin, Heidelberg, 2012, pp. 526–543.

S. Yang, P. Lai, J. Lin, Design role-based multi-tenancy access control scheme for cloud services, in: IEEE International Symposium on Biometrics and Security Technologies (ISBAST), 2013, pp. 273–279.

Shahanawaj Ahamad, Mohammed Abdul Bari, Big Data Processing Model for Smart City Design: A Systematic Review “, VOL 2021: ISSUE 08 IS SN : 0011-9342 ;Design Engineering (Toronto) Elsevier SCI Oct : 021;Q4 Journal

Downloads

Published

24.03.2024

How to Cite

L. K. Suresh Kumar. (2024). Cloud Computing Data Storage Security: A Comprehensive Review. International Journal of Intelligent Systems and Applications in Engineering, 12(3), 4443 –. Retrieved from https://www.ijisae.org/index.php/IJISAE/article/view/7205

Issue

Section

Research Article